U.S. District Judge Stephen Wilson's Injunction

Total Page:16

File Type:pdf, Size:1020Kb

U.S. District Judge Stephen Wilson's Injunction Case 2:06-cv-05578-SVW-JC Document 421 Filed 03/23/10 Page 1 of 15 1 2 3 4 5 6 7 UNITED STATES DISTRICT COURT 8 CENTRAL DISTRICT OF CALIFORNIA 9 10 COLUMBIA PICTURES INDUSTRIES, ) CV 06-5578 SVW (JCx) 11 INC., et al., ) ) ORDER RE: PLAINTIFFS’ MOTION 12 Plaintiffs, ) FOR PERMANENT INJUNCTION [395] ) 13 v. ) ) 14 GARY FUNG, et al., ) ) 15 Defendants. ) ) 16 17 18 19 20 21 22 23 24 25 26 As stated at the March 22, 2010 hearing, the Court’s proposed 27 deletions and additions are contained herein. The parties’ responses 28 Case 2:06-cv-05578-SVW-JC Document 421 Filed 03/23/10 Page 2 of 15 1 to the Court’s alterations — and only the Court’s alterations — shall 2 be filed according to the following schedule: 3 -Defendants’ response of no more than eight pages: March 29, 2010; 4 -Plaintiffs’ reply of no more than eight pages: April 5, 2010; 5 -Defendants’ sur-reply of no more than five pages: April 12, 2010. 6 Upon receiving the parties’ briefing, the Court will issue such further 7 orders as are necessary. 8 The Court’s proposed additions are highlighted in UNDERLINED BOLD 9 and deletions in strike-through text. 10 /// 11 /// 12 /// 13 On December 21, 2009, the Court granted Plaintiffs’ Motion for 14 Summary Judgment on Liability, Docket # 391 (the “Order”), finding that 15 Defendants Gary Fung and Isohunt Web Technologies, Inc. (collectively, 16 “Defendants”) induced infringement of Plaintiffs’ copyrights in 17 violation of United States copyright law. See Metro-Goldwyn-Mayer 18 Studios, Inc. v. Grokster, 545 U.S. 913, 125 S. Ct. 2764, 162 L. Ed. 2d 19 781 (2005). The Court found that “evidence of Defendants’ intent to 20 induce infringement is overwhelming and beyond reasonable dispute,” 21 Order at 25, and therefore that “Defendants’ inducement liability is 22 overwhelmingly clear,” id. at 15. On the issue of a permanent 23 injunction, the Court has considered the briefs filed by the parties 24 and the argument presented at the hearing on this matter. Based on the 25 foregoing and all matters of record in this action, pursuant to Federal 26 Rule of Civil Procedure 65 and 17 U.S.C. § 502, the Court enters a 27 28 2 Case 2:06-cv-05578-SVW-JC Document 421 Filed 03/23/10 Page 3 of 15 1 Permanent Injunction in favor of Plaintiffs and against Defendants in 2 accordance with the terms contained herein. 3 The Court concludes that a permanent injunction should issue to 4 restrain further infringement of Plaintiffs’ copyrights. Plaintiffs 5 have satisfied their burden under eBay Inc. v. MercExchange, L.L.C., 6 547 U.S. 388, 126 S. Ct. 1837, 164 L. Ed. 2d 641 (2006), “(1) that 7 [they have] suffered an irreparable injury; (2) that remedies available 8 at law, such as monetary damages, are inadequate to compensate for that 9 injury; (3) that, considering the balance of hardships between the 10 plaintiff[s] and defendant[s], a remedy in equity is warranted; and (4) 11 that the public interest would not be disserved by a permanent 12 injunction.” Id. at 391. 13 Plaintiffs have demonstrated that they have suffered irreparable 14 harm, and would suffer further irreparable harm from Defendants’ 15 continued infringement, in three independent ways. First, given the 16 staggering volume of infringement of Plaintiffs’ copyrights, it is 17 extremely unlikely that Defendants will be able fully to compensate 18 Plaintiffs monetarily for the infringements Defendants have induced in 19 the past, or the infringements they could induce in the future. Metro- 20 Goldwyn-Mayer Studios, Inc. v. Grokster, 518 F. Supp. 2d 1197, 1217 21 (C.D. Cal. 2007) (“Grokster V”). Second, given the way in which 22 Defendants’ system works, when Defendants’ end-users download one of 23 Plaintiffs’ works, the end-users automatically and simultaneously 24 further distribute the work to innumerable others as a required part of 25 the download process; additionally, at the conclusion of the download, 26 Defendants’ end-users obtain an unprotected digital copy of Plaintiffs’ 27 28 3 Case 2:06-cv-05578-SVW-JC Document 421 Filed 03/23/10 Page 4 of 15 1 work that those end-users can further distribute indefinitely at will.1 2 Thus, when Defendants induce infringement, “Plaintiffs’ copyrighted 3 works can be unstoppably and near-instantaneously infringed throughout 4 the computer-literate world with the files obtained by [Defendants’] 5 end-users. Plaintiffs’ power to control their rights has been so 6 compromised by the means through which [Defendants] encouraged end- 7 users to infringe (digital files plus the internet) that the inducement 8 amounts to irreparable harm.” Id. at 1218-19. Third, it is axiomatic 9 that the availability of free infringing copies of Plaintiffs’ works 10 through Defendants’ websites irreparably undermines the growing 11 legitimate market for consumers to purchase access to the same works. 12 E.g., Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 13 928-29, 125 S. Ct. 2764, 162 L. Ed. 2d 781 (2005) (“digital 14 distribution of copyrighted material threatens copyright holders as 15 never before, because every copy is identical to the original, copying 16 is easy, and many people (especially the young) use file-sharing 17 software to download copyrighted works”); A&M Records, Inc. v. Napster, 18 Inc., 239 F.3d 1004, 1017 (9th Cir. 2001) (citing “Napster’s 19 deleterious effect on the present and future digital download market”). 20 21 1 The Court notes that Defendants argue that the Supreme Court’s holding in Grokster was limited solely to “devices” that induce 22 infringement. Defendants further argue that they are immune from an 23 injunction against their “activities.” (Opp. at 6-7, 19.) Defendants’ argument lacks merit. Nothing in Grokster requires that 24 there be a “device”; the central inquiry is based on the defendants’ “purposeful, culpable expression and conduct.” Grokster, 545 U.S. at 25 937. The Supreme Court’s holding in Grokster was not limited solely to “devices.” The Supreme Court used terms such as “device,” 26 “product,” and “tool” interchangeably. Id. at 940 n.13. In 27 addition, the clear import of the Supreme Court’s opinion was that a defendant may be secondarily liable for his conduct and activities 28 wholly separate and apart from any products, devices, or tools. 4 Case 2:06-cv-05578-SVW-JC Document 421 Filed 03/23/10 Page 5 of 15 1 For many of the same reasons, Plaintiffs have demonstrated that 2 they do not have an adequate remedy at law for the harm that has been 3 or could be caused by Defendants’ infringement. “‘Damages are no 4 remedy at all if they cannot be collected.’” Grokster V, 518 F. Supp. 5 2d at 1219 (quoting Douglas Laycock, The Death of the Irreparable 6 Injury Rule, 103 Harv. L. Rev. 687, 716 (1990)). Likewise, “[a] legal 7 remedy is inadequate if it would require a multiplicity of suits.” Id. 8 at 1220 (quoting Laycock, 103 Harv. L. Rev. at 714) (alteration in 9 original). Here, especially given the multiplicity of infringements of 10 Plaintiffs’ works caused by a single user downloading a single dot- 11 torrent file from Defendants’ sites, see Order at 6-7, it would be 12 untenable for Plaintiffs to track and proceed against each infringing 13 end-user. Additionally, Plaintiffs would not be able to recover 14 damages from Defendants for the inevitable derivative infringements 15 that would occur outside Defendants’ websites when copyrighted content 16 acquired as a result of Defendants’ inducement is further distributed 17 by Defendants’ users. These further infringements are a continuing 18 threat, making remedies at law insufficient to compensate for 19 Plaintiffs’ injuries. The only realistic method for remedying such 20 future harm from Defendants’ inducement is by way of a permanent 21 injunction. Grokster V, 518 F. Supp. 2d at 1220. 22 The balance of hardships between Defendants and Plaintiffs also 23 warrants the issuance of a permanent injunction. As described, absent 24 an injunction, Plaintiffs would suffer a severe hardship as a result of 25 Defendants’ inducement of infringement. The injunction being ordered 26 by the Court would not pose a corresponding hardship on Defendants. 27 The Court has already found that Defendants’ websites are used 28 5 Case 2:06-cv-05578-SVW-JC Document 421 Filed 03/23/10 Page 6 of 15 1 overwhelmingly for copyright infringement, with upwards of 95% of all 2 dot-torrent files downloaded from Defendants’ websites corresponding to 3 works that are infringing or at least highly likely to be infringing. 4 Liability Order at 10-11. Obviously, the harm to Defendants from no 5 longer being able to exploit and profit from that infringement is not a 6 hardship the Court need consider. See Cadence Design Sys., Inc. v. 7 Avant! Corp., 125 F.3d 824, 829 (9th Cir. 1997) (defendant “cannot 8 complain of the harm that will befall it when properly forced to desist 9 from its infringing activities” (citation and internal quotation marks 10 omitted)). Beyond that, the Court’s injunction is limited to 11 Plaintiffs’ copyrights and will not substantially interfere with any 12 claimed non-infringing aspects of Defendants’ system. 13 The Court is further persuaded that Defendants would likely 14 continue to induce infringement in the absence of a permanent 15 injunction. As this Court observed in Grokster: 16 [A] successful inducer will sometimes have no need to repeat the 17 infringing message ad infinitum.
Recommended publications
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ……….
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Piratebrowser Artifacts
    PirateBrowser Artifacts Written by Chris Antonovich Researched by Olivia Hatalsky 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu Published Date Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................................. 2 Background: ........................................................................................................................................................................ 2 Purpose and Scope: ............................................................................................................................................................
    [Show full text]
  • Searching for Malware in Bittorrent∗
    Searching for Malware in BitTorrent∗ Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many different changing technologies, in- cluding recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTor- rent. This project explored BitTorrent for the presence of malware, and discovered a significant portion of malware in the downloaded file set. Statistics on torrents infected with malware were gathered and analyzed to find patterns that are helpful in creating basic filtering heuristics. While these heuristics may work in simple cases, several easy ways they can be defeated were found. 1 Introduction Recently, peer-to-peer networks have emerged as a popular paradigm for Internet applications. In fact, a study in 2005 estimated that P2P traffic accounted for around 70% of all traffic on the Internet [2]. P2P technology is finding new applications as it grows, including voice-over-IP systems and streaming video delivery. While P2P has found several different uses, perhaps the most widely-known use is for file sharing. One concern with P2P file sharing is that it can be used to distribute malware (malicious software, such as worms, viruses, and rootkits). On the one hand, users have access to huge amounts of data, while on the other hand, this data can easily be tainted with viruses, worms, and other forms of malware. An important consideration, then, is if the concern about malware in P2P networks is warranted, and if it is, are there ways to protect a computer and minimize the risk of malware infection from P2P networks.
    [Show full text]
  • High Court Judgment Template
    MR. JUSTICE BIRSS 20C Fox v Sky - Popcorn Time Approved Judgment Neutral Citation Number: [2015] EWHC 1082 (Ch) Case No: HC2014 - 002029 IN THE HIGH COURT OF JUSTICE CHANCERY DIVISION Royal Courts of Justice, Rolls Building Fetter Lane, London, EC4A 1NL Date: 28/04/2015 Before: MR JUSTICE BIRSS - - - - - - - - - - - - - - - - - - - - - Between: (1) TWENTIETH CENTURY FOX FILM CORPORATION (2) UNIVERSAL CITY STUDIOS PRODUCTIONS LLP (3) WARNER BROS. ENTERTAINMENT INC. (4) PARAMOUNT PICTURES CORPORATION (5) DISNEY ENTERPRISES, INC (6) COLUMBIA PICTURES INDUSTRIES, INC. (On their own behalf and on behalf of all other companies that are controlled by, controlling of or under common control of the members of the Motion Picture Association of America Inc that are the owners, or exclusive licensees, of the copyright in films and television programmes) Claimants - and - (1) SKY UK LIMITED (2) BRITISH TELECOMMUNICATIONS PLC (3) EE LIMITED (4) TALKTALK TELECOM LIMITED (5) VIRGIN MEDIA LIMITED Defendants - - - - - - - - - - - - - - - - - - - - - Richard Spearman QC (instructed by Wiggin LLP) for the Claimants The defendants did not appear and were not represented Hearing dates: 24th March 2015 - - - - - - - - - - - - - - - - - - - - - Approved Judgment I direct that pursuant to CPR PD 39A para 6.1 no official shorthand note shall be taken of this Judgment and that copies of this version as handed down may be treated as authentic. ............................. MR. JUSTICE BIRSS MR. JUSTICE BIRSS 20C Fox v Sky - Popcorn Time Approved Judgment Mr Justice Birss: 1. The claimants are all members of the Motion Picture Association of America and hold copyright in a large number of films and television programmes. This is an application by those companies for an order under s97A of the Copyright Designs and Patents Act 1988.
    [Show full text]
  • GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business a Report on the Profitability of Ad-Supported Content Theft
    GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business A Report on the Profitability of Ad-Supported Content Theft February 2014 www.digitalcitizensalliance.org/followtheprofit CONTENTS Contents .............................................................................................................................................................i Table of References .....................................................................................................................................ii Figures .........................................................................................................................................................................................ii Tables ...........................................................................................................................................................................................ii About this Report ..........................................................................................................................................1 Executive Summary .................................................................................................................................... 3 Three Key Relevant Growth Trends .................................................................................................... 4 Methodology .................................................................................................................................................. 4 Sites Studied ..........................................................................................................................................................................
    [Show full text]
  • Problems with Bittorrent Litigation in the United States: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System
    Washington University Global Studies Law Review Volume 13 Issue 1 2014 Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System Violeta Solonova Foreman Washington University in St. Louis, School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Violeta Solonova Foreman, Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System, 13 WASH. U. GLOBAL STUD. L. REV. 127 (2014), https://openscholarship.wustl.edu/law_globalstudies/vol13/iss1/8 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM INTRODUCTION In 2011, 23.76% of global internet traffic involved downloading or uploading pirated content, with BitTorrent accounting for an estimated 17.9% of all internet traffic.1 In the United States alone, 17.53% of internet traffic consists of illegal downloading.2 Despite many crackdowns, illegal downloading websites continue to thrive,3 and their users include some of their most avid opponents.4 Initially the Recording Industry Association of America (the “RIAA”) took it upon itself to prosecute individuals who 1.
    [Show full text]
  • DATA MINING FILE SHARING METADATA a Comparsion Between Random Forests Classificiation and Bayesian Networks
    DATA MINING FILE SHARING METADATA A comparsion between Random Forests Classificiation and Bayesian Networks Bachelor Degree Project in Informatics G2E, 22.5 credits, ECTS Spring term 2015 Andreas Petersson Supervisor: Jonas Mellin Examiner: Joe Steinhauer Abstract In this comparative study based on experimentation it is demonstrated that the two evaluated machine learning techniques, Bayesian networks and random forests, have similar predictive power in the domain of classifying torrents on BitTorrent file sharing networks. This work was performed in two steps. First, a literature analysis was performed to gain insight into how the two techniques work and what types of attacks exist against BitTorrent file sharing networks. After the literature analysis, an experiment was performed to evaluate the accuracy of the two techniques. The results show no significant advantage of using one algorithm over the other when only considering accuracy. However, ease of use lies in Random forests’ favour because the technique requires little pre-processing of the data and still generates accurate results with few false positives. Keywords: Machine learning, random forest, Bayesian network, BitTorrent, file sharing Table of Contents 1. Introduction ............................................................................................................................ 1 2. Background ............................................................................................................................ 2 2.1. Torrent ............................................................................................................................
    [Show full text]
  • The Motion Picture Association of America's Patrolling of Internet Piracy in America, 1996-2008 by Matthew A
    Content Control: The Motion Picture Association of America’s Patrolling of Internet Piracy in America, 1996-2008 By Matthew A. Cohen Submitted to the graduate degree program in Film and Media Studies and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Chairperson: Tamara Falicov Catherine Preston Chuck Berg Robert Hurst Nancy Baym Kembrew McLeod Date Defended: August 25, 2011 Copyright 2011 Matthew A. Cohen ACCEPTANCE PAGE The Dissertation Committee for Matthew A. Cohen certifies that this is the approved version of the following dissertation: Content Control: The Motion Picture Association of America’s Patrolling of Internet Piracy in America, 1996-2008 Chairperson: Tamara Falicov Date approved: Abstract This historical and political economic investigation aims to illustrate the ways in which the Motion Picture Association of America radically revised their methods of patrolling and fighting film piracy from 1996-2008. Overall, entertainment companies discovered the World Wide Web to be a powerful distribution outlet for cultural works, but were suspicious that the Internet was a Wild West frontier requiring regulation. The entertainment industry’s guiding belief in regulation and strong protection were prompted by convictions that once the copyright industries lose control, companies quickly submerge like floundering ships. Guided by fears regarding film piracy, the MPAA instituted a sophisticated and seemingly impenetrable “trusted system” to secure its cultural products online by crafting relationships and interlinking the technological, legal, institutional, and rhetorical in order to carefully direct consumer activity according to particular agendas. The system created a scenario in which legislators and courts of law consented to play a supportive role with privately organized arrangements professing to serve the public interest, but the arrangements were not designed for those ends.
    [Show full text]
  • Movie Tags & Meaning of It
    Movie Tags & meaning of it Original Sources CAM - A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard. TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled. TELECINE (TC) - A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon.
    [Show full text]
  • Detecting Pedophile Activity in Bittorrent Networks
    Detecting Pedophile Activity in BitTorrent Networks Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, and Noa Zilberman School of Electrical Engineering, Tel-Aviv University, Israel Abstract. The wide spread of Peer-to-Peer networks makes multime- dia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal material, while keeping the source of the data and the acquiring users anonymous. In this paper we analyze activity measurements in the BitTorrent network and examine child sex abuse activity through the Mininova web portal. We detect and characterize pedophilic material in the network, and also analyze differ- ent aspects of the abusers activity. We hope our results will help law enforcement teams detecting child molesters and tracking them down earlier. 1 Introduction Peer-to-peer networks are being widely used around the world by millions of users for sharing content. The anonymity provided by these networks makes them prone to sharing illegal contents, from simple copyright protected material to highly dangerous material, as will be discussed next. The BitTorrent file sharing network was responsible for 27% to 55% of in- ternet traffic (depending on geographic location) in 2009 [13]. The BitTorrent protocol allows to download large files without loading a single source computer, rather the downloading users join a group of hosts that download and upload from each other, simultaneously. Every BitTorrent file is uniquely defined by a descriptor file called a torrent, which is distributed via email or http websites. This torrent file allows the downloading and uploading users, called leechers and seeders, to share the content file.
    [Show full text]